An sami ƙin yarda da raunin sabis wanda ya shafi tsarin

Kwanaki kadan da suka gabata aka fitar da labarin cewa tawagar binciken na Qualys ya gano ƙin yarda da raunin sabis saboda gajiya a cikin tsarin, don haka duk wani mai amfani da ba shi da gata na iya amfani da wannan raunin don toshe systemd.

Ularfafawa an riga an tsara shi azaman (CVE-2021-33910) An ambaci cewa yana shafar systemd yana haifar da gazawa yayin ƙoƙarin hawa kan shugabanci tare da girman hanyar da ta fi 8 MB ta hanyar FUSE kuma a cikin abin da tsarin fara sarrafawa (PID1) ya ƙare daga ƙwaƙwalwar tari kuma yana kulle, yana saka tsarin a cikin "tsoro" jihar.

An gabatar da wannan rauni a cikin tsarin v220 (Apr 2015) ta hanyar aiwatar da 7410616c ("kernel: rework unit name manipulation and validation logic"), wanda ya maye gurbin strdup () a kan tsibi tare da strdupa () a cikin baturin. Nasarar amfani da wannan raunin yana ba da damar kowane mai amfani mara amfani ya haifar da ƙi sabis ta firgita kernel.

Da zaran ƙungiyar bincike ta Qualys ta tabbatar da raunin, Qualys ya shiga cikin alhakin bayyana raunin kuma ya haɗu tare da marubucin da rarraba tushen buɗewa don sanar da raunin.

Masu binciken sun ambaci hakan matsalar mai alaƙa da CVE-2021-33910 ya taso saboda gaskiyar cewa masu sa ido na tsarin da fasalta abubuwan / proc / kai / mountinfo kuma yana ɗaukar kowane matakin hawa a cikin aikin unit_name_path_escape () wanda ke haifar da aiwatar da aikin da ake kira "strdupa ()" wanda ke kula da rarraba bayanai akan tari maimakon tara.

Shi yasa tun daga lokacin matsakaicin adadin tari an iyakance ta aikin "RLIMIT_STACK", yin doguwar hanya zuwa wurin tsaunin yana haifar da tsarin "PID1" ya rataye wanda ke haifar da tsarin tsayawa.

Bugu da kari, sun ambaci cewa don kai hari don aiki, ana iya amfani da mafi sauƙin tsarin FUSE a haɗe tare da yin amfani da madaidaicin madaidaicin matsayi azaman wurin hawa, wanda girman hanyar sa ya wuce 8 MB.

Hakanan Yana da mahimmanci a ambaci cewa masu binciken Qualys ambaci wani akwati tare da rauni, tunda musamman tare da tsarin 248, wanda ba shi da amfani saboda kwaro wanda ke cikin lambar tsarin wanda ke sa / proc / kai / mountinfo ya gaza. Hakanan yana da ban sha'awa cewa irin wannan yanayin ya bayyana a cikin 2018, kamar yayin ƙoƙarin rubuta wani amfani don raunin CVE-2018-14634 a cikin kwarangwal na Linux, inda masu binciken Qualys suka sami wasu mahimman lamuran uku a cikin tsarin.

Game da rauni An ambaci ƙungiyar Red Hat duk wani samfurin da ya yarda da RHEL shima zai iya shafar.

Wannan ya hada da:

  • Kwantena na samfuran da suka dogara da hotunan kwantena na RHEL ko UBI. Ana sabunta waɗannan hotunan a kai a kai, kuma yanayin kwantena yana nuna ko akwai gyara don wannan aibi ana iya duba shi a cikin Index of Health Container, wani ɓangare na Kundin Kayayyakin Ruwa na Hat (https://access.redhat.com/containers) .
  • Samfurori waɗanda suke cire fakitoci daga tashar RHEL. Tabbatar cewa tushen kunshin tsarin Linux na Red Hat Enterprise ya kasance na zamani a cikin waɗannan yanayin samfuran.

Saboda fadin farmakin farmakin wannan raunin, Qualys ya ba da shawarar cewa masu amfani su yi amfani da facin da ya dace (wanda aka riga aka sake shi 'yan kwanaki da suka gabata) don wannan rauni nan da nan.

Kamar yadda riga aka ambata matsalar ta bayyana tun systemd 220 (Apr 2015) da an riga an gyara shi babban ma'aji na systemd kuma an daidaita shi akan yawancin rabawa Babban Linux, da abubuwan da suka samo asali, zaku iya duba matsayin a cikin hanyoyin haɗin yanar gizo masu zuwa (Debian, Ubuntu, Fedora, RHEL, SUSSA, Arch).

A ƙarshe, idan kuna sha'awar ƙarin sani game da shi game da wannan yanayin rauni, zaka iya bincika bayanan sa A cikin mahaɗin mai zuwa.


Bar tsokaci

Your email address ba za a buga. Bukata filayen suna alama da *

*

*

  1. Wanda ke da alhakin bayanan: Miguel Ángel Gatón
  2. Manufar bayanan: Sarrafa SPAM, sarrafa sharhi.
  3. Halacci: Yarda da yarda
  4. Sadarwar bayanan: Ba za a sanar da wasu bayanan ga wasu kamfanoni ba sai ta hanyar wajibcin doka.
  5. Ajiye bayanai: Bayanin yanar gizo wanda Occentus Networks (EU) suka dauki nauyi
  6. Hakkoki: A kowane lokaci zaka iyakance, dawo da share bayanan ka.